“…This conceptual projection includes the following dimensions: - Inference engine : Since the data about the persons of interest that is stored in the watchlist is often incomplete, uncertain, imperfect, fragmentary, and conflicting [2, 3], a powerful inference engine is needed at various phases of gathering, evidence accumulation, control, fusion, recognition, tracking in the surveillance network, as well as risk assessment and prediction. These inferences can be executed by Bayesian networks [18] and their extensions such as dynamic Bayesian networks, as well as methods for dealing with conflicting information [19], and deep learning techniques based on neural networks [20]. Technological components, including artificial intelligence and computational intelligence tools, should be developed, implemented, and deployed under fundamental social constraints and regulations.
- Social embedding : The watchlist utilises mechanisms for embedding in social infrastructure such as exploring various databases, local security resources, big data analysis, and possibilities of surveillance networks for identification and tracking.
- Interview supporting technology : Motivated by the fact that the traveller's cooperation is a crucial factor for improving the watchlist performance, the watchlist screening should be integrated into interview supporting machines – a well identified trend for deception detection as applied to e‐border infrastructure.
- Countermeasures : The watchlist can be vulnerable to attacks on its integrity.
…”